GitHub监控消息提醒!!!
更新了:RCE
描述:Mirage uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/Lcdemi/Mirage
标签:#RCE
更新了:RCE
描述:Mirage uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/Lcdemi/Mirage
标签:#RCE
GitHub
GitHub - Lcdemi/Mirage: Mirage uses C++, PHP, HTML, Python, Go, and Ansible to deploy vulnerable web servers capable of spawning…
Mirage uses C++, PHP, HTML, Python, Go, and Ansible to deploy vulnerable web servers capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines. - Lcdemi/Mirage
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 winning bug.
URL:https://github.com/D4m0n/CVE-2025-50168-pwn2own-berlin-2025
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 winning bug.
URL:https://github.com/D4m0n/CVE-2025-50168-pwn2own-berlin-2025
标签:#CVE-2025
GitHub
GitHub - D4m0n/CVE-2025-50168-pwn2own-berlin-2025: CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.
CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug. - D4m0n/CVE-2025-50168-pwn2own-berlin-2025
GitHub监控消息提醒!!!
更新了:红队
描述:一个功能完整的网络安全攻防演练平台,采用红黑色调主题设计,支持实时态势感知、队伍管理、靶标部署、成绩统计等完整功能。\"蓝的世界于凌晨两点沉入梦境,红的天地在此刻悄然迎来黎明。\"
URL:https://github.com/g0dxing/Red_Game
标签:#红队
更新了:红队
描述:一个功能完整的网络安全攻防演练平台,采用红黑色调主题设计,支持实时态势感知、队伍管理、靶标部署、成绩统计等完整功能。\"蓝的世界于凌晨两点沉入梦境,红的天地在此刻悄然迎来黎明。\"
URL:https://github.com/g0dxing/Red_Game
标签:#红队
GitHub
GitHub - g0dxing/Red_Game: 一个功能完整的网络安全攻防演练平台,采用红黑色调主题设计,支持实时态势感知、队伍管理、靶标部署、成绩统计等完整功能。"蓝的世界于凌晨两点沉入梦境,红的天地在此刻悄然迎来黎明。"
一个功能完整的网络安全攻防演练平台,采用红黑色调主题设计,支持实时态势感知、队伍管理、靶标部署、成绩统计等完整功能。"蓝的世界于凌晨两点沉入梦境,红的天地在此刻悄然迎来黎明。" - g0dxing/Red_Game
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/iptables6cv/CVE-2025-25252-POC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-25252-POC
URL:https://github.com/iptables6cv/CVE-2025-25252-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploitation proof-of-concept against CVE-2025-12428 for Chromium V8 JavaScript issues like type confusion
URL:https://github.com/dexterm300/cve-2025-12428-exploit-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Exploitation proof-of-concept against CVE-2025-12428 for Chromium V8 JavaScript issues like type confusion
URL:https://github.com/dexterm300/cve-2025-12428-exploit-poc
标签:#CVE-2025
GitHub
GitHub - dexterm300/cve-2025-12428-exploit-poc: Exploitation proof-of-concept against CVE-2025-12428 for Chromium V8 JavaScript…
Exploitation proof-of-concept against CVE-2025-12428 for Chromium V8 JavaScript issues like type confusion - dexterm300/cve-2025-12428-exploit-poc
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Exploitation proof-of-concept against CVE-2025-12428 for Chromium V8 JavaScript issues like type confusion
URL:https://github.com/dexterm300/cve-2025-59287-exploit-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Exploitation proof-of-concept against CVE-2025-12428 for Chromium V8 JavaScript issues like type confusion
URL:https://github.com/dexterm300/cve-2025-59287-exploit-poc
标签:#CVE-2025
GitHub
GitHub - dexterm300/cve-2025-59287-exploit-poc: Exploitation proof-of-concept for CVE-2025-59287 - a critical vulnerability in…
Exploitation proof-of-concept for CVE-2025-59287 - a critical vulnerability in the Windows Server Update Service (WSUS) caused by the deserialization of untrusted data. This flaw allows an unauthor...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-41090 (brokeCLAUDIA): Broken access control in microCLAUDIA, the anti-ransomware platform by CCN-CERT.
URL:https://github.com/TheMalwareGuardian/brokeCLAUDIA
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-41090 (brokeCLAUDIA): Broken access control in microCLAUDIA, the anti-ransomware platform by CCN-CERT.
URL:https://github.com/TheMalwareGuardian/brokeCLAUDIA
标签:#CVE-2025
GitHub
GitHub - TheMalwareGuardian/brokeCLAUDIA: CVE-2025-41090 (brokeCLAUDIA): Broken access control in microCLAUDIA, the anti-ransomware…
CVE-2025-41090 (brokeCLAUDIA): Broken access control in microCLAUDIA, the anti-ransomware platform by CCN-CERT. - TheMalwareGuardian/brokeCLAUDIA
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:N8N Remote Code Execution CVE-2025-62726 POC/Exploit
URL:https://github.com/Malayke/n8n-remote-code-exection-cve-2025-62726-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:N8N Remote Code Execution CVE-2025-62726 POC/Exploit
URL:https://github.com/Malayke/n8n-remote-code-exection-cve-2025-62726-exploit
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-62481
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-62481
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-62481
URL:https://github.com/B1ack4sh/Blackash-CVE-2025-62481
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:N8N Remote Code Execution CVE-2025-62726 POC/Exploit
URL:https://github.com/Malayke/n8n-remote-code-execution-cve-2025-62726-exploit
标签:#CVE-2025
更新了:CVE-2025
描述:N8N Remote Code Execution CVE-2025-62726 POC/Exploit
URL:https://github.com/Malayke/n8n-remote-code-execution-cve-2025-62726-exploit
标签:#CVE-2025
👍1
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:XWiki Unauthenticated RCE Exploit for Reverse Shell
URL:https://github.com/80Ottanta80/CVE-2025-24893-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:XWiki Unauthenticated RCE Exploit for Reverse Shell
URL:https://github.com/80Ottanta80/CVE-2025-24893-PoC
标签:#CVE-2025
GitHub
GitHub - 80Ottanta80/CVE-2025-24893-PoC: XWiki Unauthenticated RCE Exploit for Reverse Shell
XWiki Unauthenticated RCE Exploit for Reverse Shell - 80Ottanta80/CVE-2025-24893-PoC
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔧 Automate Red Team operations with RedOpsScript, streamlining security assessments and enhancing your cybersecurity posture.
URL:https://github.com/skynetgroups/RedOpsScript
标签:#Red Team
更新了:Red Team
描述:🔧 Automate Red Team operations with RedOpsScript, streamlining security assessments and enhancing your cybersecurity posture.
URL:https://github.com/skynetgroups/RedOpsScript
标签:#Red Team
GitHub
GitHub - skynetgroups/RedOpsScript: 🔧 Automate Red Team operations with RedOpsScript, streamlining security assessments and enhancing…
🔧 Automate Red Team operations with RedOpsScript, streamlining security assessments and enhancing your cybersecurity posture. - skynetgroups/RedOpsScript
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A DLL template designed to interface with Cobalt Strike
URL:https://github.com/Sizeable-Bingus/CS-Postex-Template
标签:#Cobalt Strike
更新了:Cobalt Strike
描述:A DLL template designed to interface with Cobalt Strike
URL:https://github.com/Sizeable-Bingus/CS-Postex-Template
标签:#Cobalt Strike
GitHub
GitHub - Sizeable-Bingus/CS-Postex-Template: A DLL template designed to interface with Cobalt Strike
A DLL template designed to interface with Cobalt Strike - Sizeable-Bingus/CS-Postex-Template
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/GuDi0v0/-1-
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/GuDi0v0/-1-
标签:#护网
GitHub
GitHub - GuDi0v0/KaiEnZhanJi_BetaII: 《凯恩战记》是一款基于喜羊羊与灰太狼题材的角色扮演类网页游戏,由4399游戏、迪士尼、原创动力(喜羊羊与灰太狼)三方合作开发。游戏首次发行日期为2013年2月6日,主要面向儿童玩…
《凯恩战记》是一款基于喜羊羊与灰太狼题材的角色扮演类网页游戏,由4399游戏、迪士尼、原创动力(喜羊羊与灰太狼)三方合作开发。游戏首次发行日期为2013年2月6日,主要面向儿童玩家,提供了一个横版过关的幻想社区。游戏平台为PC webgame,开发商和发行商均为4399游戏。游戏在2015年1月15日正式关闭服务器并下线游戏入口。 游戏《凯恩战记》以喜羊羊与灰太狼的角色为背景,创造了一个奇幻...
GitHub监控消息提醒!!!
更新了:渗透测试
描述:JS Hunter - JavaScript Analysis Tool for Penetration Testing. 一个专业的JavaScript代码分析工具,支持浏览器插件和桌面应用两种形式,集成AI分析引擎,用于渗透测试中的JS文件收集和安全分析。
URL:https://github.com/wuwang1028/js-hunter
标签:#渗透测试
更新了:渗透测试
描述:JS Hunter - JavaScript Analysis Tool for Penetration Testing. 一个专业的JavaScript代码分析工具,支持浏览器插件和桌面应用两种形式,集成AI分析引擎,用于渗透测试中的JS文件收集和安全分析。
URL:https://github.com/wuwang1028/js-hunter
标签:#渗透测试
GitHub
wuwang1028/js-hunter
JS Hunter - JavaScript Analysis Tool for Penetration Testing. 一个专业的JavaScript代码分析工具,支持浏览器插件和桌面应用两种形式,集成AI分析引擎,用于渗透测试中的JS文件收集和安全分析。 - wuwang1028/js-hunter
GitHub监控消息提醒!!!
更新了:应急响应
描述:基于签名的Windows服务管理程序,适用于基于签名对Windows服务进行分组、查询、启停等。也可用于应急响应
URL:https://github.com/Lq0ne/WinSCControl
标签:#应急响应
更新了:应急响应
描述:基于签名的Windows服务管理程序,适用于基于签名对Windows服务进行分组、查询、启停等。也可用于应急响应
URL:https://github.com/Lq0ne/WinSCControl
标签:#应急响应
GitHub
GitHub - Lq0ne/WinSCControl: 基于签名的Windows服务管理程序,适用于基于签名对Windows服务进行分组、查询、启停等。也可用于应急响应
基于签名的Windows服务管理程序,适用于基于签名对Windows服务进行分组、查询、启停等。也可用于应急响应 - Lq0ne/WinSCControl